Chinese character string encryption and decryption method

A technology of Chinese characters and encryption methods, applied in the field of information security, can solve problems such as difficult writing or identification, poor readability and reproducibility of ciphertext, etc.

Active Publication Date: 2019-09-27
NANTONG UNIVERSITY
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing Chinese character encryption algorithm, the readability and reproducibility of most of the ciphertexts obtained are too poor, there are too many ciphertext characters that are difficult to write or recognize, and there is no combination of the characteristics of Chinese and English characters. Convenient, safe and reliable encryption algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chinese character string encryption and decryption method
  • Chinese character string encryption and decryption method
  • Chinese character string encryption and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0161] According to the encryption method of a kind of Chinese character string in the above-mentioned specific embodiment, the steps are as follows:

[0162] (1)将某段中文字符串“一种中文字符串的加密和解密方法,简单实用。”逐个字符转换成数值型数据,得到高位数值序列P1={210,214,214,206,215,183,180,181,188,195,186,189,195,183,183,163,188,181,202,211,161}和低位数值序列P2={187,214,208,196,214,251,174,196,211,220,205,226,220,189,168,172,242,165,181,195,163 }, wherein the length of the numerical sequence P1, P2 is consistent with the length of the string, which is recorded as L=21;

[0163] (2) First use the external encryption key (α=0.12345, β=23.45), let the initial value x 1 =α and parameter μ=β, according to formula x in the encryption method step (2) of a kind of Chinese character string in the above-mentioned specific embodiment k+1 =cos(μ arccos(x k )) Iterates the Chebyshev chaotic system shown in , and obtains the chaotic sequence X, and extracts the element x from the chaotic sequence X 300 =-0.925809812983847, as the formula y...

Embodiment 2

[0175] According to the above-mentioned encryption method of a Chinese character string, a certain section of the Chinese character string to be encrypted is "a method for encrypting and decrypting a Chinese character string, which is simple and practical." The encryption steps are similar to the specific embodiment 1, only the encryption key Minor changes occur: α = 0.12345000000001; or β = 23.45000000000001; or C1 22 = 20; or C2 0 =13, the Chinese character string encryption results are shown in Table 1. It can be seen from Table 1 that a slight change in the encryption key will cause a large change in the encrypted ciphertext of the Chinese character string, so it can be seen that the encryption method for the Chinese character string proposed in this patent is sensitive to the encryption key.

[0176] Table 1 When the external encryption key changes slightly, the Chinese character string encryption result

[0177]

Embodiment 3

[0179] According to the above-mentioned encryption method of a Chinese character string, its encryption steps are similar to those in Embodiment 1, and only a certain section of the Chinese character string to be encrypted ("a method for encrypting and decrypting a Chinese character string is simple and practical.") undergoes slight changes. : "Two kinds of encryption and decryption methods for Chinese character strings, which are simple and practical."; or "A method for encryption and decryption of Chinese substrings, which is simple and practical."; or "A method for encrypting and decrypting Chinese character strings , simple and practical.”; or “A method for encrypting and decrypting Chinese character strings, which is simple and practical.”; or “A method for encrypting and decrypting Chinese character strings, which is simple and practical.”; or “A method for encrypting and decrypting Chinese character strings, which is simple and practical.”; Encryption and decryption meth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Chinese character string encryption and decryption method. The method comprises the following steps of converting a certain section of Chinese character string into the high-order and low-order numerical sequences; then obtaining a reverse diffusion encrypted ciphertext sequence of the high-order numerical sequence and a forward diffusion encrypted ciphertext sequence of the low-order numerical sequence through the loop operation of the single iteration of a chaotic system, the reverse diffusion encryption of the elements of the high-order numerical sequence one by one, the forward diffusion encryption of the elements of the low-order numerical sequence one by one and the parameter adjustment series operation of the chaotic system; and finally, carrying out numerical value and character conversion on the reverse diffusion encrypted ciphertext sequence and the forward diffusion encrypted ciphertext sequence to obtain an encrypted ciphertext of the section of Chinese character string, and decrypting the ciphertext through a similar method to restore the original Chinese character string. According to the method, the Chinese character string is encrypted and decrypted by utilizing the password characteristic of the chaotic signal, so that the known/selected plaintext attack resistance and the ciphertext-only attack resistance are good, and the encryption and decryption safety of the Chinese character string is ensured.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an encryption method and a decryption method of a Chinese character string. Background technique [0002] With the rapid development of modern communication technology, computer network has become a means of information exchange in many fields. Since the computer network is an open network, information exchange often faces security issues such as information theft, tampering and forgery. At this time, the research and application of information encryption technology is imperative. [0003] At present, most mainstream information encryption and decryption technologies can only be applied to information composed of single-byte characters such as letters, numbers, and English punctuation marks, while information encryption algorithms that can be used for information composed of double-byte characters such as Chinese characters and Chinese punctuation marks are rare. E...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 盛苏英张小美陆国平张振娟周磊朱建红任宇高岩波任洁
Owner NANTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products